Get my own profile
Public access
View all33 articles
18 articles
available
not available
Based on funding mandates
Co-authors
- jianyong chenShenzhen universityVerified email at szu.edu.cn
- Jianwen XiangWuhan University of TechnologyVerified email at whut.edu.cn
- ABDELGHANI DAHOUUniversity Ahmed Draia - AdrarVerified email at univ-adrar.dz
- Guodong YeGuangdong Ocean University, ChinaVerified email at gdou.edu.cn
- Lm ChengAssociate Professor of Electronic Engineeing, Cit University of Hong KongVerified email at cityu.edu.hk
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
- Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
- Dr. Kaitai LiangCybersecurity Group, EMCS, TU DELFTVerified email at tudelft.nl
- Dr. Mohamed Abd ElazizAssociate Professor, Galala UniversityVerified email at zu.edu.eg
- Dongdong ZhaoWuhan University of TechnologyVerified email at whut.edu.cn
- Xing TangWuhan University of TechnologyVerified email at my.cityu.edu.hk
- Prof Anthony TS HoProfessor of Multimedia SecurityVerified email at surrey.ac.uk
- Yoon-Ho ChoiProfessor of Computer Science and Engineering, Pusan National UniversityVerified email at pusan.ac.kr
- Zhilong WangThe Pennsylvania State UniversityVerified email at psu.edu
- Xinrong WuHuazhong University of Science and TechnologyVerified email at hust.edu.cn
- qiuzhen linShenzhen UniversityVerified email at szu.edu.cn
- Manos PanaousisProfessor of Cyber Security, Centre for Sustainable Cyber Security (CS2), University of GreenwichVerified email at greenwich.ac.uk
- QIAO YANShenzhen universityVerified email at szu.edu.cn
- Fei ChenShenzhen UniversityVerified email at szu.edu.cn
- F. Richard YuCarleton University, Ottawa, ON, CanadaVerified email at carleton.ca